1<testcase>
2# Server-side
3<reply>
4<servercmd>
5REPLY PASV 227 Entering Passiv Mode (1216,256,2,127,127,127)
6</servercmd>
7</reply>
8
9# Client-side
10<client>
11<server>
12ftp
13</server>
14 <name>
15FTP getting bad host in 227-response to PASV
16 </name>
17 <command>
18ftp://%HOSTIP:%FTPPORT/237 --disable-epsv
19</command>
20</client>
21
22# Verify data after the test has been "shot"
23# The bogus address used here is chosen specifically so that when processed on
24# certain hosts with buggy resolver code, the resulting address (192.0.2.127)
25# is from an address block that is guaranteed never to be assigned (RFC3330).
26<verify>
27# curl: (15) Can't resolve new host 1216.256.2.127:32639
28# 15 => CURLE_FTP_CANT_GET_HOST
29# some systems just don't fail on the illegal host name/address but instead
30# moves on and attempt to connect to... yes, to what?
31# 7= CURLE_COULDNT_CONNECT
32<errorcode>
3315, 7
34</errorcode>
35<protocol>
36USER anonymous
37PASS ftp@example.com
38PWD
39PASV
40</protocol>
41</verify>
42</testcase>
43